Wonderland

Penetration Testing Methodology
Reconnaissance
nmap
Enumeration
Directory Bruteforce using dirbuster & Gobuster
Exploitation
Privilege Escalation
Capturing the flag
user.txt
root.txt
Walkthrough - There is so many rabbit hole. Watch out.
nmap - to find open port
enumerate directory (Gobuster // Dirbuster)
or
-> We can use any Gobuster or Dirbuster. But for this machine I recommend use dirbuster. It will make your task easier.
First

Second

Third

Fourth

Fifth

Sixth

Seventh

ssh
Oops, there is root.txt. But we can't opened it.

Here, where the hint is really useful.

okay then we try a usual place for root.txt.

Well, that was an easy guess I think.
By AdaniKamal
Last updated